IT infrastructure

Effective, secure, and stable

Your digital infrastructure

in safe hands at OAS AG

To stay competitive, your computer-assisted processes always have to run speedily and efficiently. This is because IT security in particular is a daily challenge. Furthermore, threats to your IT environment, such as viruses, spyware, ransomware, and Trojans, are more subtle than ever. So, continuous and holistic protection will be sought after in future.

More important than ever: You have to count on an IT infrastructure which provides effectiveness, security, and stability. This is what OAS AG with their custom-fit and efficient hardware and software solutions have stood for – all the time since 1992. Since then, our employees have developed optimum and forward-looking IT solutions for small and medium-sized enterprises.

To ensure smooth processes in the daily routine, our qualified employees take on the analysis and strategic planning of your infrastructure. Moreover, we will optimise your IT systems, including all software components, and, consequently, will provide for continuity and efficiency of your IT infrastructure.


Server & storage concepts – highly redundant and efficient

Each server solution has to be individually adjusted to your company as well as to complex business processes. Here, we rely on modern architecture combining effective sequences of operation with high computing power and reliability. If you need advice regarding a state-of-the art system solution for your demands, do not hesitate to contact us. We will be glad to be at your service. We will support you with our know-how in all matters of advice – the planning and conceptual design of your storage solution, the implementation, and the subsequent smooth operation backed up by our support. We will compile the perfect configuration for your demands and realise a custom-fit server and storage infrastructure.

we realise the storage concepts below for you

  • Storage-Area-Network (SAN)
  • Network-Attached-Storage (NAS)
  • Direct-Attached-Storage (DAS)
  • Storage virtualisation
  • Storage on demand
  • Software-defined storage
  • Flash storage
Virtualisation provides for an optimum hardware utilisation and automated operational procedures

A virtualisation solution provides for maximum utilisation of your resources. You will reduce your hardware inventory, increase efficiency, and save not only administrative expenditure but also hardware and energy expenses. How does it work? The hardware allocates resources to various virtual machines. This entails optimum utilisation of your hardware. Moreover, operational procedures can be automated and applications made available faster. Additionally, virtualisation increases your performance and availabilities

We implement for you:

Virtualisation of the server environment provides for an optimum utilisation as well as quicker and more flexible reaction of the existing hardware. The existing performance resources of the hardware are dynamically distributed between the different virtual machines (VM).

With a desktop virtualisation, instead of physical workstations virtual desktops are automated and thereupon made available quickly. This allows working anytime and anywhere using any desired end device.

Storage components and storage capacities can be utilised in a better way when being dynamically distributed or combined – depending on the corresponding network requirements.

your benefits at a glance

  • Reduced hardware costs
  • Automated operational procedures
  • Less administrative expenditure
  • Prevention of failures
  • Improved server utilisation
  • Simpler IT infrastructure
  • Increased availability and scalability
Reliable next generation data backup

The extent of lost information in your company may be considerable and highly-detrimental to your business. We assist you with reliable data backup to enable you in the worst case to recover data in a rapid and simple manner. We will be glad to develop in cooperation with you an individual plan for your data backup strategy.

rapid and secure data recovery

  • effortless recovery of virtual servers and data
  • rapid re-establishment of operation in your company
  • reliable backup of virtual and physical infrastructures
  • efficient use of resources thanks to high compression rates
  • additional data security, e.g. by using the cloud (private cloud, public cloud)
  • replication of your data to make them highly available is an additional option
IT monitoring for proactive failure detection

Increasing server capacities as well as an increasing number of IT applications make it difficult for IT managers to keep track of all functional capacities. Elaborate error diagnoses could take many hours and a failure could become really expensive in a short time. An IT monitoring solution delivers up-to-date and permanent network monitoring and you may react immediately to any failure already before any noticeable problem occurs.

your benefits at a glance

  • Considerable increase in network efficiency through monitoring of utilisation and bandwidth
  • Early identification of available services, resources, bandwidth, and system utilisation
  • Budgeting of future demand possible
  • Various notification methods and device-independent data access 
  • Simple check of assigned Support Level Agreements
  • Proactive trend detection and scaling of your IT


IT security as a central challenge

IT security is one of the main challenges for IT administration. Illegal access and threatening attacks on the network and your valuable data are accumulating and in many cases a simple firewall is not sufficient anymore. More and more companies are believing in custom-fit security strategies with synchronised hardware and software.

We support you.

our portfolio at a glance

    No more Zero-Day Exploits, Trojan viruses & encryption Trojans – we offer sufficient protection against present-day IT threats
    Your data are always secure – within your company network and when being accessed from the outside
    We ensure secure access and provide for sufficient protection against illegal misuse
    Wherever you stay – we guarantee the protection of your sensitive data
    Bring your own devices – no problem thanks to a central management of mobile end devices to get a high level of security
Use the Client Management to centrally manage and control your IT infrastructure

Our digitised working environment permanently demands maximum performance from our IT experts. The variety and performance of different end devices is increasing and at the same time highest security in day-to-day operations has to be ensured. To the end of a permanent protection of your IT resources and to keep track of all weak points and operating systems, time-consuming regular patching is required. Client Management provides for a central management and control of your IT infrastructure. Thus, a management software assists you in managing your server, clients, and mobile end devices in a rapid and simple manner. Automated installations will increase your security factor as well as eliminate weak points and security flaws in operating systems and other applications.

automated and reliable endpoint management

  • Inventories of hardware, software, apps, and licenses
  • Installation of operating systems
  • Backup and data storage
  • Providing for endpoint security
  • Hardware management
  • Management of virtual environments
Professional e-mail management for the No. 1 business medium

Despite of an increasing number of communication channels, the communication by e-mail is still second to none. All communication with customers, suppliers, and partners takes place rapidly and simply by e-mail. However, the more extensively a communication medium is used in business, the higher the demands on e-mail management will be. We shed light on this.

demands on e-mail management

  • e-mail archiving required by law according to GoBD (German directive on the principles for the proper management and storage of books, records and documents in electronic form, as well as data access) & complying with data protection requirements
  • integrated anti-virus & ransomware protection
  • anti-spam functions
  • encrypted transmission option
  • immutability to be ensured
  • hosted e-mail server
  • relieved mail server load
IT documentation for the transparency of your IT infrastructure

A stable IT documentation gives you a permanent insight of your current status of IT infrastructure. Whether the software, the network components, or the systems used – everything is registered in an automated manner and can be retrieved when required. This way, it is easier to localise and eliminate errors and take the right decisions on IT processes and strategies.

with just a few steps to an automated system documentation

    Automated registration of systems, virtual systems, application servers, network services, databases, data storage/backup, and cloud environment
    Preparation of plans with automated updates, such as Active Directory plans, cable routing plans, Layer 3 network plans
    Gathering useful data through analysis and improvement of your IT security, e.g. by depositing user authorisations or managing license and software service contracts

We are here for you

Your contact persons for IT infrastructure

Sönke Kramer

Authorised Officer Head of Sales

Fon +49 421 2206-0

Rudolf Lukas

Consulting and Distribution, IT solutions

Phone +49 421 2206-0

Christian Hinkelmann, Beratung und Vertrieb IT Lösungen

Christian Hinkelmann

Beratung und Vertrieb IT Lösungen

Fon +49 421 2206-0

Your inquiry

We are at your disposal and looking forward to your inquiry.

Your contact to OAS AG

Are you interested in more information about OAS AG? Do you want to ask for a quotation? Do you have questions about one of our business segments? Or do you need support on your hardware, software, or infrastructure? Please do not hesitate to contact us. We will be pleased to help you!